A Certi ed Ethical Hacker is attempting to gather information about a target organization's network structure through network footprinting. During the operation, they encounter ICMP blocking by the target system's firewall. The hacker wants to ascertain the path that packets take to the host system from a source, using an alternative protocol. Which of the following actions should the hacker consider next? A. Use UDP Traceroute in the Linux operating system by executing the 'traceroute' command with the destination IP or domain name. B. Use the ICMP Traceroute on the Windows operating system as it is the default utility. C. Use the ARIN Whois database search tool to find the network range of the target network. D. Utilize the Path Analyzer Pro to trace the route from the source to the destination target systems. Correct Answer: A This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer